Return to Article Details Vulnerabilities in One Time Passwords and Protection Method Using Secret Key and Biometric Hash Code Download Download PDF